Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

I am partial to Elcomsoft products as they have never dissapointed me: http://www.elcomsoft.com/archpr.html Advanced archive password recovery. I love it, it works well, and is well worth the money if you have users that do this often... as we do...
-rich

Try www.packetstormsecurity.org they have a pretty comprehensive database full of these tools. They even have explainations on there capabilities on most.

The ones that were mentioned above are all great tools, and yes...sometimes brute forcing takes time, if it didnt take anytime it would be the equivlent of asking yourseklf, why set a password...lol

Recommendation: If you are going to password protect your files, store a master password list in a safe place, such as a safe or safe deposit box..(not on your system)...that way you woulnt have to waste countles hours in the futre trying to recover the files that you shoult nativly have access too. I am assuming you own these files that you are trying to crack...if not thats a whole oterh dicussion :-)

Featured Post

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers.
According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…